Twitter’s huge knowledge breach that uncovered buyer emails and telephone numbers might have impacted greater than 5 million customers.
In late July, a menace actor leaked knowledge from 5.4 million Twitter accounts that was obtained by exploiting a now-patched vulnerability within the well-liked social media platform.
The menace actor supplied the stolen knowledge on the market on the favored hacker discussion board Breached Boards. In January, a report printed in Hacker claimed the invention of a vulnerability that may be exploited by an attacker to discover a Twitter account by the related telephone quantity/e mail, even when the person has opted out of it within the privateness choices. .
“The vulnerability permits any get together with none authentication to acquire a twitter id(which is sort of the identical as getting the username of an account) from no person submitting a telephone quantity/e mail regardless that the person has Prohibited this motion within the privateness settings.. The bug exists as a result of authorization course of used within the Android Twitter Consumer, particularly within the means of verifying the duplication of a Twitter account. ” reads the outline within the report despatched by zhirinovskiy via the HackerOne bug bounty platform. “It is a critical menace, as not solely can individuals discover customers who’ve restricted the power to be discovered by e mail/telephone quantity, however any attacker with primary scripting/coding data can listing a big a part of Twitter person base unavailable. to the earlier enumeration (create a database with telephone/e mail connections to username). Such databases may be offered to malicious events for promoting functions or with a purpose to establish celebrities in numerous malicious actions.”
The vendor claimed that the database contained knowledge (ie emails, telephone numbers) of customers starting from celebrities to companies. The vendor additionally shared an information pattern within the type of a csv file.

In August, Twitter confirmed that the info breach was attributable to the now-patched zero-day flaw submitted by the zhirinovskiy researchers through bug bounty platform HackerOne and that it obtained a $5,040 bounty.
“We wish to inform you a couple of vulnerability that allowed somebody to enter a telephone quantity or e mail handle within the login movement in an try to be taught if that data was linked to an present Twitter account, and in that case, which particular account. .” read the Twitter notice. “In January 2022, we obtained a report via our bug bounty program of a vulnerability that allowed somebody to establish the e-mail or telephone quantity related to an account or, in the event that they knew the e-mail or telephone variety of an individual, they may establish their Twitter account, if it existed”, continues the social networking agency.
“This bug was the results of an replace to our code in June 2021. Once we realized of this, we instantly investigated and stuck it. At the moment, we had no proof to counsel that somebody had taken benefit of the vulnerability.”
This week, the web site 9to5mac.com claimed that the info breach was greater than what the corporate initially reported. The web site studies that a number of menace actors exploited the identical flaw and that the info out there within the cybercrime underground has completely different sources.
“A large Twitter knowledge breach final yr, which uncovered greater than 5 million telephone numbers and e mail addresses, was worse than initially reported. We’ve got been proven proof that the identical safety vulnerability was exploited by a number of dangerous actors, and the hacked knowledge has been supplied on the market on the darkish internet by varied sources.” learn the put up printed by 9to5mac.com

9to5MacThe claims are based mostly on the provision of the info set that contained the identical data in a special format supplied by a special menace actor. The supply advised the web site that the database was “simply one in all a number of information they’ve seen.” Plainly the affected accounts are solely those who have the “Visibility | phone option (which is tough to search out in Twitter settings)” enabled in late 2021.
The file seen by 9to5Mac consists of knowledge pertaining to Twitter customers within the UK, virtually all EU international locations and elements of the US.
“I bought a number of information, one by telephone quantity nation code, which incorporates the telephone quantity <-> Twitter account title matching for the countrywide telephone quantity area of +XX 0000 to +XX 9999.” The supply advised 9to5Mac. “Any Twitter account that had the discoverability | The telephone possibility enabled on the finish of 2021 was included within the dataset.”
Specialists speculate that a number of menace actors gained entry to Twitter’s database and mixed it with knowledge from different safety breaches.
The safety researcher behind the account. @chadloder (Twitter after the information broke) advised 9to5Mac that “the e-mail and Twitter pairings had been derived by operating giant present databases of over 100 million e mail addresses via this e mail discovery vulnerability.” Twitter.”
The researcher advised the web site that they might contact Twitter for remark, however all the media relations workforce left the corporate.
TO UPDATE:
Replace: after discussing with my colleague @sonoclaudio, we observed that the put up on the favored breach discussion board studies that 1.4 accounts had been suspended. Now the query is, why months after the accounts had been suspended, the info was nonetheless current within the database? What’s the retention interval for Twitter? Does Twitter violate the GDPR for European customers?
Comply with me on twitter: @safetyissues Y Fb Y Mastodon
Pierluigi Paganini
(Safety Points – hacking, Twitter)
share on